Oct 29, 2014
With the rise of data breaches, CIOs and CISOs are quickly learning that internal security breaches as a result of social engineering are occurring more often than they’d like to admit. And while everyone seems to be championing best practices for Cyber Security, awareness is not the same as changing behavior. It’s...
Oct 15, 2014
Consider this: A high level threat or APT has presented an aggressive and imminent threat on your organization. Depending on the company and the circumstance, you face either severe loss and theft of precious crown jewels, or the disruption and sabotage of your operations from those looking to do harm. You can...
Oct 8, 2014
Left and right, major CISOs have suffered data breaches despite undergoing best practices for security protection. Threats keep surfacing, and there’s no such thing as “perfect security”. Where should organizations rethink security standards and better assess the risks at hand? Understanding those threats starts...
Oct 6, 2014
As In-Memory computing has grown in the minds of practitioners along with solution offerings from major players, analysts have been keeping a watchful eye on this emerging technology. And while the idea itself is not radically new, there's debate now as to whether or not in-memory is ready for the mainstream. We sit...